06_

Page 1

Chapter 6: Types of Utility Programs and Operating Systems MULTIPLE CHOICE 1. Which of the following is not an operating system function? a. starting the computer c. word processing b. managing programs d. establishing an Internet connection ANS: C

PTS: 1

REF: 271

2. A ____ boot is the process of using the operating system to restart a computer. a. warm c. start b. cold d. new ANS: A

PTS: 1

REF: 272

3. As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Shut down button menu. a. Stand By c. Restart b. Turn Off d. Cancel ANS: C

PTS: 1

REF: 272

4. A ____ interface controls how you enter data and instructions and how information is displayed on the screen. a. control c. user b. utility d. management ANS: C

PTS: 1

REF: 272


5. In a ____, the user types commands or presses special keys on the keyboard to enter data and instructions. a. command-line interface c. performance-monitor interface b. menu-driven interface d. graphical user interface (GUI) ANS: A

PTS: 1

REF: 273

6. With a ____, users interact with menus and visual images such as buttons and other graphical objects to issue commands. a. command-line interface c. performance-monitor interface b. menu-driven interface d. graphical user interface (GUI) ANS: D

PTS: 1

REF: 273

7. The purpose of memory ____ is to optimize the use of RAM. a. performance c. throttling b. management d. integration ANS: B

PTS: 1

REF: 275

8. A(n) ____ is an operation the processor manages. a. buffer c. task b. spool d. event ANS: C

PTS: 1

REF: 275

9. As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer. a. paging c. swapping b. spooling d. waiting ANS: B

PTS: 1

REF: 275


10. Multiple print jobs line up in a ____ within a buffer as shown in the accompanying figure. a. queue c. page b. row d. virtual page ANS: A

PTS: 1

REF: 276

11. ____ means the operating system automatically configures new devices as you install them. a. Virtual memory c. Page logging b. Operational buffering d. Plug and Play ANS: D

PTS: 1

REF: 276

12. A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network. a. client c. integrated b. multitasking d. server ANS: D

PTS: 1

REF: 277

13. A network ____, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network. a. administrator c. client b. owner d. master ANS: A

PTS: 1

REF: 278

14. A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. a. user name c. client b. password d. cycle ANS: A

PTS: 1

REF: 278

15. A performance ____ is a program that assesses and reports information about various computer resources and devices. a. monitor c. reporter b. manager d. roster ANS: A

PTS: 1

REF: 277

16. A ____ is a private combination of characters associated with the user name that allows access to certain computer resources. a. folder c. user name b. password d. cipher ANS: B

PTS: 1

REF: 278


17. Which of the following is not a utility function like the ones shown in the accompanying figure? a. managing files c. controlling the keyboard b. viewing images d. uninstalling programs ANS: C

PTS: 1

REF: 277

18. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file. a. video card c. scanner b. video driver d. image viewer ANS: D

PTS: 1

REF: 285

19. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____, is a utility that performs functions related to file management. a. monitor c. scanner b. manager d. controller ANS: B

PTS: 1

REF: 285

20. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files. a. application remover c. uninstaller


b. application purger ANS: C

PTS: 1

d. antiapp utility REF: 285

21. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk ____ utility searches for and removes unnecessary files. a. diagnostic c. operator b. uninstaller d. cleanup ANS: D

PTS: 1

REF: 286

22. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a screen ____, is a utility that causes a display device’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. a. manager c. utility b. saver d. protector ANS: B

PTS: 1

REF: 287

23. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions. a. firewall c. threat neutralizer b. antihacker d. protection utility ANS: A

PTS: 1

REF: 287

24. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____ utility, identifies computer problems but does not repair them. a. troubleshooting c. operational b. executional d. diagnostic ANS: D

PTS: 1

REF: 291

25. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____ utility, shrinks the size of a file. a. scanner c. defragmenter b. compression d. archiver ANS: B

PTS: 1

REF: 290

26. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance. a. maintenance c. functional b. multitasking d. proprietary ANS: A

PTS: 1

REF: 291

27. Which of the following is NOT a type of operating system? a. wireless c. server b. stand-alone d. embedded ANS: A

PTS: 1

REF: 279


28. The first version of Windows was developed in the mid-____. a. 1960s c. 1980s b. 1970s d. 1990s ANS: C

PTS: 1

REF: 280

29. A ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device. a. multitasking c. single-user b. media-based d. stand-alone ANS: D

PTS: 1

REF: 280

30. Which of the following is NOT an edition of Windows 7? a. Enterprise c. Home Premium b. Ultimate d. Starter ANS: A

PTS: 1

REF: 280

31. Apple’s latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple. a. Safari c. OS X b. OS IX d. OS XI ANS: C

PTS: 1

32. To defragment a disk means to ____. a. slow it down b. diagnose problems with it ANS: C

PTS: 1

REF: 281

c. reorganize it d. repair it REF: 286

33. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. a. firewall c. virus b. agent d. spyware ANS: C

PTS: 1

REF: 288

34. ____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. a. Compression software c. Resident software b. Symbianware d. Adware ANS: D

PTS: 1

REF: 289


35. To ____ a file, you restore a zipped file to its original form. a. restore c. zip b. archive d. uncompress ANS: D

PTS: 1

REF: 290

36. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages. a. blocker c. stopper b. driver d. monitor ANS: A

PTS: 1

REF: 290

37. Compressed files sometimes are called ____ files. a. skipped c. zipped b. controlled d. defragmented ANS: C

PTS: 1

REF: 290

38. ____ is a popular stand-alone file compression utility. a. Smasher c. CompUtil b. PKZIP d. All of the above ANS: B

PTS: 1

REF: 290

39. ____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information. a. Phishing c. Pharming b. Zipping d. Authenticating ANS: A

PTS: 1

REF: 290

40. A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites. a. operating c. zipping b. phishing d. antispam ANS: B

PTS: 1

REF: 290

MULTIPLE RESPONSE Modified Multiple Choice 1. System software serves as the interface between the ____. a. server c. user b. application software d. computer’s hardware ANS: B, C, D

PTS: 1

REF: 270

2. Command-line interfaces are hard to use because they require exact ____. a. diction c. spelling b. grammar d. punctuation ANS: B, C, D

PTS: 1

REF: 273

3. ____ allow hundreds to thousands of users to connect at the same time, and thus are multiuser. a. Networks c. Servers


b. Mainframes ANS: A, B, C, D

d. Supercomputers PTS: 1

4. ____ is an embedded operating system. a. Solaris b. Google Android ANS: B, C, D

PTS: 1

REF: 275

c. Symbian OS d. Windows Phone 7 REF: 279

5. Disc burning software usually also includes ____ editing capabilities. a. photo c. video b. Web site d. audio ANS: A, C, D

PTS: 1

REF: 291

MODIFIED TRUE/FALSE 1. The kernel is memory resident, which means it remains on the hard disk while the computer is running. _________________________ ANS: F, in memory PTS: 1

REF: 272

2. When you purchase application software, the package identifies the required platform. _________________________ ANS: T

PTS: 1

REF: 272

3. When you install new software, often an on-screen prompt instructs you to restart the computer, in which case a cold boot is appropriate. _________________________ ANS: F, warm PTS: 1

REF: 272

4. Symbian OS is an example of a(n) network operating system. _________________________ ANS: F, embedded PTS: 1

REF: 283

5. A(n) Internet spy removes or blocks certain items from being displayed. _________________________ ANS: F, filter PTS: 1

REF: 289

TRUE/FALSE 1. On mobile devices, the operating system may reside on a RAM chip.


ANS: F

PTS: 1

REF: 271

2. The boot process is similar for large and small computers. ANS: T

PTS: 1

REF: 272

3. In a multitasking environment, many programs run in the foreground, while one program remains in the background. ANS: F

PTS: 1

REF: 274

4. One drawback of multiprocessing is that it tends to reduce a computer’s processing speed. ANS: F

PTS: 1

REF: 275

5. Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory. ANS: F

PTS: 1

REF: 275

6. Multiuser operating systems always process jobs on a first-come, first-served basis. ANS: F

PTS: 1

REF: 275

7. While waiting for devices to become idle, the operating system places items in buffers. ANS: T

PTS: 1

REF: 275

8. If a printer does not have its own internal memory or if its memory is full, the operating system’s buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed. ANS: T

PTS: 1

REF: 275

9. Virtual memory is faster than RAM. ANS: F

PTS: 1

REF: 275

10. The operating system determines the order in which tasks are processed. ANS: T

PTS: 1

REF: 275

11. If you attach a new device to a computer, its driver must be installed before you can use the device. ANS: T

PTS: 1

REF: 276


12. A network administrator is a program that monitors network performance. ANS: F

PTS: 1

REF: 278

13. Encryption is the process of encoding data and information into an unreadable form. ANS: T

PTS: 1

REF: 278

14. Windows 7 is available in several editions, which are grouped in two general categories: Embedded and Personal. ANS: F

PTS: 1

REF: 280

15. Linux is an example of proprietary software, which means that its code is available to the public. ANS: F

PTS: 1

REF: 282

16. Windows Embedded CE is designed for use on computing devices with limited functionality. ANS: T

PTS: 1

REF: 283

17. Palm OS is an example of a stand-alone operating system. ANS: F

PTS: 1

REF: 283


18. Utility programs, like those shown in the accompanying figure, are considered to be application software. ANS: F

PTS: 1

REF: 284

19. The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk scanner, is a utility that removes a program from system files. ANS: F

PTS: 1

REF: 285

20. Fragmentation slows down disk access and the performance of the entire computer. ANS: T

PTS: 1

REF: 286

21. Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions. ANS: T

PTS: 1

REF: 287


22. Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitor’s screen. ANS: F

PTS: 1

REF: 287

23. Most antivirus programs also protect against worms and Trojan horses. ANS: T

PTS: 1

REF: 288

24. An anti-spam program restricts access to certain material on the Web. ANS: F

PTS: 1

REF: 289

25. Uncompressing a file is the same as zipping a file. ANS: F

PTS: 1

REF: 290

COMPLETION 1. The operating system typically resides on the computer’s ____________________. ANS: hard disk PTS: 1

REF: 271

2. The operating system a computer uses sometimes is called the ____________________. ANS: platform PTS: 1

REF: 272

3. When turning on a computer that has been powered off completely, you are performing a(n) ____________________. ANS: cold boot PTS: 1

REF: 272

4. ____________________ is the process of starting or restarting a computer. ANS: Booting PTS: 1

REF: 272


5. With a(n) ____________________, you interact with menus and visual images such as buttons and other graphical objects to issue commands. ANS: GUI graphical user interface PTS: 1

REF: 273

6. ____________________ memory is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM. ANS: Virtual PTS: 1

REF: 275

7. The operating system technique of swapping items between memory and storage is called ____________________. ANS: paging PTS: 1

REF: 275

8. When an operating system spends much of its time paging, instead of executing application software, it is said to be ____________________. ANS: thrashing PTS: 1

REF: 275

9. A(n) ____________________ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device. ANS: buffer PTS: 1

REF: 275

10. To protect sensitive data and information as it travels over a network, an operating system often ____________________ it. ANS: encrypts PTS: 1

REF: 278

11. New versions of an operating system usually are ____________________ compatible. ANS: backward PTS: 1

REF: 279

12. Windows ____________________ is Microsoft’s fastest, most efficient operating system to date, offering quicker application startup, built-in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities.


ANS: 7 PTS: 1

REF: 280

13. Linux is ____________________ software, which means its code is available to the public for use, modification, and redistribution. ANS: open source PTS: 1

REF: 282

14. Novell’s NetWare is a(n) ____________________ operating system. ANS: server PTS: 1

REF: 283

15. UNIX and Linux often are called ____________________ operating systems because they are both stand-alone and server operating systems. ANS: multipurpose PTS: 1

REF: 283

16. The operating system on most PDAs and small devices, called a(n) ____________________ operating system, resides on a ROM chip. ANS: embedded PTS: 1

REF: 283


17. A(n) ____________________ like the one in the accompanying figure is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs. ANS: utility PTS: 1

REF: 284

18. A(n) ____________________ copies itself repeatedly in memory or over a network, using up system resources and possibly shutting the system down. ANS: worm PTS: 1 REF: 288 19. A(n) ____________________ hides within or looks like a legitimate program such as a screen saver. ANS: Trojan horse PTS: 1

REF: 288

20. ____________________ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. ANS: Spyware


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.